Melissa Virus

5th February 2020 | Cybrary Melissa Virus


The Melissa Virus is malware that was was deployed in late March of 1999. A programmer by the name of David Lee Smith took over an America Online (AOL) account and used that account to post a file on an Internet newsgroup. The posting was advertising free login credentials to adult content websites, using the file as bait. Once the users on the website downloaded and opened the file, a virus was deployed onto their computer. The virus hacked into user’s Microsoft Outlook account and sent emails with the same malicious file to the first 50 contacts in the contact list. This was one of the first big attacks that caught people’s attention, and one of the first real phishing attacks. This attack was a harbinger of our online future as today we continue to be plagued by even more sophisticated social engineering and phishing attacks. 

As an SMB Owner, what does this mean for me?

The Melissa virus cost companies millions of dollars in damages. As a business owner, make sure your company’s cybersecurity program includes the following protections:

  1. Train your employees, have a robust awareness program in place to train on how to spot and avoid email based phishing attacks, social engineering, and many other modern hacker attack methods.
  2. Govern your employees with policies on Information Handling, Acceptable Use of Computers, and Passwords at a minimum.
  3. Have a Risk Assessment performed on your company to understand the potential threats and vulnerabilities you face and then once you decide on a budget, create a remediation plan to begin reducing your risks to an acceptable level.
  4. Test your employees with Phishing attacks at least quarterly, preferably more often.
  5. Ensure you have technical protections in place to protect you when your training and governance fails you and employees click on a hacker attack. Antivirus, SPAM filtering, removing Administrator Rights to your windows desktops, and deploying a Password Manager are all strong starting activities for low cybersecurity maturity companies. As you mature you will need to add additional technical solutions to improve your protections.
  6. Finally, this specific virus attack taught us not to trust Microsoft VB Scripts. Later viruses exploited Macro capabilities in MS office documents. As a consequence, many companies now filter out attachments that contain both VB scripts and Macros to eliminate Melissa type risks. Most AV companies and products now protect against these attacks.

Related Terms: Administrator Rights, Phishing, Social Engineering, Trojan HorseVirus

Related Reading: Sextortion Email Scam: Don’t Allow Yourself To Be Victimized

Source: FBI Article – Melissa Virus’ 20th Anniversary 

To learn more about 5 of the worst viruses of all time, watch this short video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Ever had your phone suddenly lose service for no reason, followed by a flood of “reset your password”...

Read more